2, M. T. R. (2016). Implementation of SHA-2(256) & SHA-3(512) Algorithms for Information Security. International Journal of Engineering Science and Generic Research, 2(5). Retrieved from https://ijesar.in/index.php/ijesar/article/view/58